Conferences

Search results

    TitleConferenceSpeaker(s)
    The Frontiers of Reliability EngineeringSREcon24 Europe/Middle East/AfricaHeinrich Hartmann
    OMG WTF SSO: A Beginner’s Guide to Single Sign-On (Mis)configurationSREcon24 Europe/Middle East/AfricaAdina Bogert-O'Brien
    I Can OIDC You Clearly Now: How We Made Static Credentials a Thing of the PastSREcon24 Europe/Middle East/AfricaIain Lane, Dimitris Sotirakis
    SRE Saga: The Song of Heroes and VillainsSREcon24 Europe/Middle East/AfricaDaria Barteneva
    You Depend on Time, This Is How It Works and You Won’t Believe ItSREcon24 Europe/Middle East/AfricaPhilip Rowlands
    Dude, You Forgot the Feedback: How Your Open Loop Control Planes Are Causing OutagesSREcon24 Europe/Middle East/AfricaLaura de Vesine
    SREcon24 EMEA Lightning TalksSREcon24 Europe/Middle East/Africa
    A Taxonomy of C Decompiler Fidelity IssuesUSENIX Security '24Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues
    SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data PlanesUSENIX Security '24Sophia Yoo, Xiaoqi Chen, Jennifer Rexford
    SpecLFB: Eliminating Cache Side Channels in Speculative ExecutionsUSENIX Security '24Xiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao
    Vulnerability-oriented Testing for RESTful APIsUSENIX Security '24Wenlong Du, Jian Li, Yanhao Wang, Libo Chen, Ruijie Zhao, Junmin Zhu, Zhengguang Han, Yijun Wang, Zhi Xue
    K-Waay: Fast and Deniable Post-Quantum X3DH without Ring SignaturesUSENIX Security '24Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay
    SWOOSH: Efficient Lattice-Based Non-Interactive Key ExchangeUSENIX Security '24Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe
    "I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans CreatorsUSENIX Security '24Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles
    Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron AppsUSENIX Security '24Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis
    DVa: Extracting Victims and Abuse Vectors from Android Accessibility MalwareUSENIX Security '24Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio
    SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security MeasurementsUSENIX Security '24Aleksei Stafeev, Giancarlo Pellegrino
    Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code PagesUSENIX Security '24Seunghun Han, Seong-Joong Kim, Wook Shin, Byung Joon Kim, Jae-Cheol Ryou
    "I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content CreatorsUSENIX Security '24Lea Gröber, Waleed Arshad, Shanza, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz
    Towards Privacy-Preserving Social-Media SDKs on AndroidUSENIX Security '24Haoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing
    UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance RepresentationUSENIX Security '24Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang
    Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory ApproachUSENIX Security '24Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu
    Lotto: Secure Participant Selection against Adversarial Servers in Federated LearningUSENIX Security '24Zhifeng Jiang, Peng Ye, Shiqi He, Wei Wang, Ruichuan Chen, Bo Li
    Loopy Hell(ow): Infinite Traffic Loops at the Application LayerUSENIX Security '24Yepeng Pan, Anna Ascheman, Christian Rossow
    Eye of Sauron: Long-Range Hidden Spy Camera Detection and Positioning with Inbuilt Memory EM RadiationUSENIX Security '24Qibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, Wenqiang Jin

Pages